Word of the Day – February 26, 2025
Secure Hash Algorithm
Acronyms
- SHA
- SHA-1
- SHA-2
Preferred Term
- None
Non-standard Terms
- None
Definitions
Type | Definition | Sources |
---|---|---|
Noun | A hash algorithm with the property that is computationally unfeasible • to find a message that corresponds to a given message digest, or • to find two different messages that produce the same message digest. (used 0 times in citations and controls) |
|
Noun | A family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS) documented in FIPS PUB 180 (original SHA), FIPS PUB 180-1 (SHA-1), FIPS PUB 180-2 (SHA-1, SHA-256, SHA-384, and SHA-512). NIST has updated Draft FIPS Publication 202, SHA-3 Standard separate from the Secure Hash Standard (SHS). (used 23 times in citations and controls) |
|
Noun | SHA-1 produces a 160-bit message digest. (used 0 times in citations and controls) |
Other Forms
Type | Other Form |
---|---|
Plural | Secure Hash Algorithms |
Plural Possessive | Secure Hash Algorithms' |
Possessive | Secure Hash Algorithm's |
Relationships
Common Controls
Displaying Controls in which this term is tagged –
Show all Controls containing this term regardless of tagging
Displaying Controls containing this term –
Show only Controls in which this term is tagged
ID | Control |
---|---|
{{ control.id }} | {{ control.name }} |
None |
Citations
Displaying Citations in which
this term is tagged –
Show all Citations containing this term regardless of tagging
Displaying Citations containing this term –
Show only Citations in which
this term is tagged
AD ID | Authority Document | CT ID | Reference | Guidance | CC ID |
---|---|---|---|---|---|
{{ citation.authority_document.id }} | {{ citation.authority_document.common_name }} | {{ citation.id }} | {{ citation.reference }} | {{ citation.guidance_as_tagged || citation.guidance }} | {{ citation.control.id }} None |
None |